Defused
@DefusedCyber
Followers
5K
Following
941
Media
198
Statuses
505
Managed Honeypots for Early-warning Threat Intelligence π― Access free honeypot intel: https://t.co/TTnxgi9Hv5
Joined August 2023
π― New Defused Functionality! Automatically collect malware that gets embedded into exploit payloads 𧨠Gradually rolling out to Defused TF honeypots starting tomorrow! Subscribe today π https://t.co/vJlRQ5KUel
1
6
38
Last minute honeypot alert before Christmas π― Major enumeration sweep going on using PROPFIND, a WebDAV-specific HTTP verb. Enumeration happening from multiple IPs all from DigitalOcean servers geolocated in SGP - 159.223.71.35 188.166.219.249 157.230.44.100 139.59.123.216
0
9
27
A great reminder - do a few things and do them well vs we are going to do everything and suck at everything.
0-Day Alert π¨ Cisco warns of *unpatched* actively exploited zero-day in multiple Cisco Email Security products (CVE-2025-20393) We have just launched an Cisco ESA honeypot stream for monitoring - available now for Defused TF subscribers! π― π https://t.co/GXFaqghsXI
0
1
4
π¨ Attacks attempting exploitation of CVE-2025-20393 (Cisco Secure Email zero-day) are now attempting to drop AsyncOS-specific malware onto our honeypots π― It is still unclear if the attacks are genuine - technical details of the vulnerability are not known to date
0
7
38
0-Day Alert π¨ Cisco warns of *unpatched* actively exploited zero-day in multiple Cisco Email Security products (CVE-2025-20393) We have just launched an Cisco ESA honeypot stream for monitoring - available now for Defused TF subscribers! π― π https://t.co/GXFaqghsXI
8
48
385
π― Multiple vulnerabilities are actively being exploited in Fortinet products! Monitor exploits hitting our honeypots in real time π
Interesting Fortinet payload... CVE-2025-58034 + CVE-2025-59718 chained together? I need to get some Fortinet boxes to start testing all these exploit cocktails getting thrown at the honeypots π
0
4
24
β οΈA tool has been released for automating the discovery of CVE-2025-20393 targets (Cisco Secure Email zero-day) We are seeing it chained with POST requests to implant C2 servers π― This is likely not the genuine vulnerable path - technical details of the vulnerability are not
2
16
64
Fortigate SSO pathway fingerprinting (CVE-2025-59718) is going on pretty actively... Just tweaked the honeypot responses to be a bit more favourable - lets see if we can tease out more actions from some of these actors π―
2
15
63
pov: you launched your 0day exploit on a random server but itβs @DefusedCyber honeypot and now your bug is burned
2
4
37
0-Day Alert π¨ Cisco warns of *unpatched* actively exploited zero-day in multiple Cisco Email Security products (CVE-2025-20393) We have just launched an Cisco ESA honeypot stream for monitoring - available now for Defused TF subscribers! π― π https://t.co/GXFaqghsXI
1
14
73
No malware. Just RCE -> reverse shell -> C2. Source domain taken down ? Well, infra still up and VT or EDR won't help This is realβworld initial access tradecraft baby! Observed on @DefusedCyber cc @SimoKohonen
#OffensiveSecurity #CTI #RedTeam
4
12
72
This may be the coolest thing ive built yet Running live on one honeypot now and seems to work nicely. Will take a bit to update the full fleet but weβll get there π―
π― New Defused Functionality! Automatically collect malware that gets embedded into exploit payloads 𧨠Gradually rolling out to Defused TF honeypots starting tomorrow! Subscribe today π https://t.co/vJlRQ5KUel
3
4
70
π¨ CVE-2025-59718 (FortiCloud SSO login bypass) exploitation is under way - at least 7 different IPs exploiting our Fortinet honeypots over the weekend Example (decoded) payload: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_bypass1337"
3
34
129
π¨ React has disclosed two new, additional vulnerabilities to the critical RCE vuln of last week - CVE-2025-55183 and CVE-2025-55184. Patches are available and urged to be applied immediately. Track live attacks against React honeypots π https://t.co/GXFaqggV8a
0
19
84
Public accountability post: there will be a cool @DefusedCyber release on Monday (stuck in overoptimization land again)
3
1
13
π¨ Critical (CVSS 9.9) RCE vuln in SAP Solution Manager (CVE-2025-42880) allows an authenticated attacker to execute code. We have added it as a honeypot stream into Defused TF. π― This vulnerability does not have a POC yet. Lets go hunting! π https://t.co/0KmalJdGuV
2
12
77
Good to find an explanation why some madman threw thousands of random SOAP exploits at Ivanti honeypots today
Today, weβre releasing watchTowr Labsβ @chudyPBβs BlackHat .NET research, owning Barracuda, Ivanti and more solutions. Enjoy the read as Piotr explains a new .NET Framework primitive, used to achieve pre- and post-auth RCE on numerous enterprise appliances.
1
4
55
Monitor threat intelligence for Ivanti-based attack vectors on Defused π https://t.co/GXFaqggV8a
0
0
2